A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4121 https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5124 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-51242018-09-21T03:18:16Z A secure and efficient ID-based aggregate signature scheme for wireless sensor networks SHEN, Limin MA, Jianfeng LIU, Ximeng WEI, Fushan MIAO, Meixia Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model. 2017-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4121 info:doi/10.1109/JIOT.2016.2557487 https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University designated verifier identity-based (ID-based) coalition attack data aggregation unforgeability wireless sensor network (WSN) big data Aggregate signature Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
designated verifier identity-based (ID-based) coalition attack data aggregation unforgeability wireless sensor network (WSN) big data Aggregate signature Information Security |
spellingShingle |
designated verifier identity-based (ID-based) coalition attack data aggregation unforgeability wireless sensor network (WSN) big data Aggregate signature Information Security SHEN, Limin MA, Jianfeng LIU, Ximeng WEI, Fushan MIAO, Meixia A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
description |
Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily compromised by a vast of attacks, such as data interception and data tampering, etc. In this paper, we mainly focus on data integrity protection, give an identity-based aggregate signature (IBAS) scheme with a designated verifier for WSNs. According to the advantage of aggregate signatures, our scheme not only can keep data integrity, but also can reduce bandwidth and storage cost for WSNs. Furthermore, the security of our IBAS scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model. |
format |
text |
author |
SHEN, Limin MA, Jianfeng LIU, Ximeng WEI, Fushan MIAO, Meixia |
author_facet |
SHEN, Limin MA, Jianfeng LIU, Ximeng WEI, Fushan MIAO, Meixia |
author_sort |
SHEN, Limin |
title |
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
title_short |
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
title_full |
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
title_fullStr |
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
title_full_unstemmed |
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks |
title_sort |
secure and efficient id-based aggregate signature scheme for wireless sensor networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/4121 https://ink.library.smu.edu.sg/context/sis_research/article/5124/viewcontent/Secure_Efficient_ID_Based_Aggregate_Signature_2017.pdf |
_version_ |
1770574341335941120 |